Preserving Privacy in Data Outsourcing
-
- $109.99
-
- $109.99
Publisher Description
Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner’s control. The approach illustrated combines access control and encryption, allowing the data owner to outsource the security policy itself.
Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures
2007